ETSI M2M Workshop, 26 October 2011, Sophia Antipolis, France. "Management and Provisioning of M2M Devices for a Connected World". presentation by Musa Unmehopa, Technical Plenary Chairman of the Open Mobile Alliance (OMA) and Senior Manager at Alcatel-Lucent.
Management and Provisioning of M2M Devices and ApplicationsMusa Unmehopa
Management and Provisioning of M2M Devices and Applications, presentation by Musa Unmehopa (chairman of the Technical Plenary at the Open Mobile Alliance) to CommunicAsia 2012 conference in Singapore, 19 June 2012.
Remote device management and provisioning of all these M2M devices
will be a critical aspect to support this tremendous growth opportunity.
Connecting, provisioning and managing all these billions of M2M devices will unlock
tremendous potential to provide innovative and exciting applications.
Check out the OMA API Program at http://www.openmobilealliance.org/API/
Programmable SIM cards, SoftSIMs and eSIMsGerry O'Prey
Dynamic SIMs will change the mobile industry this year. This presentation describes the differences between the 3 kinds of dynamic SIM, programmable SIM card, SoftSIM and eSIM
Understanding Telecom SIM and USIM/ISIM for LTEntel
SIM cards have been witnessing increasing adoption with the growing use of smartphones and other devices requiring always-on connectivity. SIM cards represent a key platform for value added services and applications, and are a core element in providing interoperability among the telecom industry players while ensuring security and safe authentication.
Key Features:
Form factors: mini-SIM (2FF), micro-SIM (3FF) and nano-SIM (4FF)
Memory size: from 32k up to 256k
High security standards and strong authentication algorithms
Over-The-Air (OTA) content management
Wide range of Value Added Services applications
Management and Provisioning of M2M Devices and ApplicationsMusa Unmehopa
Management and Provisioning of M2M Devices and Applications, presentation by Musa Unmehopa (chairman of the Technical Plenary at the Open Mobile Alliance) to CommunicAsia 2012 conference in Singapore, 19 June 2012.
Remote device management and provisioning of all these M2M devices
will be a critical aspect to support this tremendous growth opportunity.
Connecting, provisioning and managing all these billions of M2M devices will unlock
tremendous potential to provide innovative and exciting applications.
Check out the OMA API Program at http://www.openmobilealliance.org/API/
Programmable SIM cards, SoftSIMs and eSIMsGerry O'Prey
Dynamic SIMs will change the mobile industry this year. This presentation describes the differences between the 3 kinds of dynamic SIM, programmable SIM card, SoftSIM and eSIM
Understanding Telecom SIM and USIM/ISIM for LTEntel
SIM cards have been witnessing increasing adoption with the growing use of smartphones and other devices requiring always-on connectivity. SIM cards represent a key platform for value added services and applications, and are a core element in providing interoperability among the telecom industry players while ensuring security and safe authentication.
Key Features:
Form factors: mini-SIM (2FF), micro-SIM (3FF) and nano-SIM (4FF)
Memory size: from 32k up to 256k
High security standards and strong authentication algorithms
Over-The-Air (OTA) content management
Wide range of Value Added Services applications
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Friendly’s 4G LTE is a unified device management solution for Fixed & Mobile devices over LTE & WiMaX networks. The
solution accelerates mass deployment of mobile services, monitors subscribers’ QoE and reduces deployment and operational
costs. Friendly’s 4G LTE solution manages and supports devices including modems, routers, RG, IPTV STBs, IP phones,
smartphones, femtocells/small cells, dongles, mobile hotspots, M2M devices and more.
LoRa vs NB-IoT, What is the difference between the two LPWAN technologies?
The proliferation of interactive data requires the support of corresponding network technologies, and the network technologies applied at this stage are not yet able to meet the needs of long-distance and narrow-bandwidth communication scenarios, in such a context, the Internet of Things was born. The low-power network, as an important technology for IoT, is developing at the fastest pace.
Network Security for Automotive Embedded SystemsTonex
In the past decade, the automotive industry has undergone tremendous technological changes in terms of connectivity and personal mobility.
Modern cars are more and more like computers rather than mechanical products. It is not uncommon for modern cars to have remote connectivity and high-tech features, such as touch-sensitive dashboards, which can keep themselves up to date through regular software updates.
In the automotive industry, the consequences can be severe-if safety-related functions are compromised, it can cause injury or death, and if a large number of vehicles are threatened or required to be recalled, it can cause serious damage to reputation.
In the new digital age, due to the vehicle’s wireless communication capabilities, mobile devices (such as cellular phones or tablets connected to the vehicle via USB, Bluetooth or Wi-Fi) may have vulnerabilities inside or inside, and this problem is becoming more and more disturbing Third-party equipment connected through the vehicle diagnostic port.
Tonex's Automotive Cybersecurity Training
Automotive Cyber Security Training (Network Security for Automotive Embedded Systems) is a 3-day course. Participants will discuss the basic principles of embedded systems and the application of cyber security in vehicles to illustrate unique vulnerabilities that are commonly exploited.
Who Should Attend:
Chief Product Security Officers (CPSO)
Control Platform
Developers working with embedded systems
Embedded software engineers and testers
Ethernet and CAN Bus Software Engineers and Testers, Hardware Testers
Functional Safety Electrical Engineering
Information security professionals
Machine Learning Platform Engineers and Managers
Mechatronics Engineer, Sensor Cleaning Engineers and PMs
The Main Points of This Course Include:
Check how to adapt to network security in automotive embedded systems
The basics of automotive network security.
Automotive network security, threats, threat agents/vectors, vulnerability and risk assessment; defense in depth, etc.
Embedded system foundation
Basic knowledge of automotive embedded system product design cycle, project management, production design, V&V and O&M.
And many more.
Course Outline:
Cybersecurity Applied to Automotive
Introduction to Embedded Systems and their Applications in Automotive
Automotive Cybersecurity Strategies
Automotive Embedded System Vulnerability Analysis
Automotive Cybersecurity and Layers of Protection
Cybersecurity Best Practices for Modern Vehicles
Standards Development and Best Practices
Securing Automotive Embedded Systems Interfaces and Protocols
Cybersecurity Attacks and Best Mitigation Practices for Automotive Embedded Systems
Evaluating Cybersecurity Practices for Modern Vehicles
Learn More:
https://www.tonex.com/training-courses/automotive-cybersecurity-training-course/
Cart Pay Solutions - Customer Reviews on TrustpilotJohn Camron
As they say, word of mouth is the advertising one can get. Being a global payment gateway, the testimonials from happy merchant makes us happy that we are are going in righ direction. However, many of our comepetitors are trying hard to drag us down but we are continously moving on our mission. Here are some of Cart Pay Reviews.
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Friendly’s 4G LTE is a unified device management solution for Fixed & Mobile devices over LTE & WiMaX networks. The
solution accelerates mass deployment of mobile services, monitors subscribers’ QoE and reduces deployment and operational
costs. Friendly’s 4G LTE solution manages and supports devices including modems, routers, RG, IPTV STBs, IP phones,
smartphones, femtocells/small cells, dongles, mobile hotspots, M2M devices and more.
LoRa vs NB-IoT, What is the difference between the two LPWAN technologies?
The proliferation of interactive data requires the support of corresponding network technologies, and the network technologies applied at this stage are not yet able to meet the needs of long-distance and narrow-bandwidth communication scenarios, in such a context, the Internet of Things was born. The low-power network, as an important technology for IoT, is developing at the fastest pace.
Network Security for Automotive Embedded SystemsTonex
In the past decade, the automotive industry has undergone tremendous technological changes in terms of connectivity and personal mobility.
Modern cars are more and more like computers rather than mechanical products. It is not uncommon for modern cars to have remote connectivity and high-tech features, such as touch-sensitive dashboards, which can keep themselves up to date through regular software updates.
In the automotive industry, the consequences can be severe-if safety-related functions are compromised, it can cause injury or death, and if a large number of vehicles are threatened or required to be recalled, it can cause serious damage to reputation.
In the new digital age, due to the vehicle’s wireless communication capabilities, mobile devices (such as cellular phones or tablets connected to the vehicle via USB, Bluetooth or Wi-Fi) may have vulnerabilities inside or inside, and this problem is becoming more and more disturbing Third-party equipment connected through the vehicle diagnostic port.
Tonex's Automotive Cybersecurity Training
Automotive Cyber Security Training (Network Security for Automotive Embedded Systems) is a 3-day course. Participants will discuss the basic principles of embedded systems and the application of cyber security in vehicles to illustrate unique vulnerabilities that are commonly exploited.
Who Should Attend:
Chief Product Security Officers (CPSO)
Control Platform
Developers working with embedded systems
Embedded software engineers and testers
Ethernet and CAN Bus Software Engineers and Testers, Hardware Testers
Functional Safety Electrical Engineering
Information security professionals
Machine Learning Platform Engineers and Managers
Mechatronics Engineer, Sensor Cleaning Engineers and PMs
The Main Points of This Course Include:
Check how to adapt to network security in automotive embedded systems
The basics of automotive network security.
Automotive network security, threats, threat agents/vectors, vulnerability and risk assessment; defense in depth, etc.
Embedded system foundation
Basic knowledge of automotive embedded system product design cycle, project management, production design, V&V and O&M.
And many more.
Course Outline:
Cybersecurity Applied to Automotive
Introduction to Embedded Systems and their Applications in Automotive
Automotive Cybersecurity Strategies
Automotive Embedded System Vulnerability Analysis
Automotive Cybersecurity and Layers of Protection
Cybersecurity Best Practices for Modern Vehicles
Standards Development and Best Practices
Securing Automotive Embedded Systems Interfaces and Protocols
Cybersecurity Attacks and Best Mitigation Practices for Automotive Embedded Systems
Evaluating Cybersecurity Practices for Modern Vehicles
Learn More:
https://www.tonex.com/training-courses/automotive-cybersecurity-training-course/
Cart Pay Solutions - Customer Reviews on TrustpilotJohn Camron
As they say, word of mouth is the advertising one can get. Being a global payment gateway, the testimonials from happy merchant makes us happy that we are are going in righ direction. However, many of our comepetitors are trying hard to drag us down but we are continously moving on our mission. Here are some of Cart Pay Reviews.
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...Musa Unmehopa
Keynote presentation at the international symposium hosted by the Open Mobile Alliance (OMA) and the China Communications Standards Association (CCSA), on Wednesday November 9, 2011, Beijing (China). The title of the symposium was "Innovating New Services Across the Network of Everything; The Role of Standards in a Hyper Connected World...". Presentation by Musa Unmehopa, Chairman of the Technical Plenary of the Open Mobile Alliance, and senior manager of standards at Alcatel-Lucent.
M2M Optimizations in Public Mobile Networks
M2M Over a Telecommunications Network
Network Optimizations for M2M
The Role of IP in M2M
IPv6 for M2M
6LoWPAN
Routing Protocol for Low-Power and Lossy Networks (RPL) CoRE
M2M Security
Trust Relationships in the M2M Ecosystem
Security Requirements
Which Types of Solutions are Suitable?
Standardization Efforts on Securing M2M and MTC Communications
M2M Terminals and Modules
M2M Module Categorization
Hardware Interfaces
Temperature and Durability Services
Software Interface
Cellular Certification
ITU-T SDP Workshop - Role of OMA in SDP StandardsMusa Unmehopa
"The Role and Contribution of OMA in Service Delivery Platform Standardization". ITU-T SDP Workshop, 17 October 2011, Geneva (Switzerland). Presentation consists of two main parts: 1) OMA standardizes key aspects of the Service Delivery Platform (SDP) and 2) shares OMA future requirements for SDP standardization. Musa Unmehopa, chairman of the OMA Technical Plenary
Opening Keynote at BMMP 2011 - OMA API ProgramMusa Unmehopa
Opening keynote presentation at the 3rd workshop on Business Model for Mobile Platforms (BMMP), 7 October 2011. Topic: How Business Model Considerations Impact the Standardization Process. The presentation makes the point that business considerations and market requirements should drive technology standardization. The presentation uses the API Program of the Open Mobile Alliance (OMA) to illustrate these points, and demonstrate how business model considerations impact the standards processes for application programming interfaces. Presentation by Musa Unmehopa, Chairman of the Technical Plenary in OMA, senior manager of standardization at Alcatel-Lucent
Opening Keynote at ICIN 2011 - OMA API ProgramMusa Unmehopa
Opening keynote presentation at the ICIN 2011 conference, 4 October, Berlin (Germany). OMA API standardization addresses the issue of industry fragmentation in the field of Application Programming Interfaces.
OMA APIs Standardize Access to Unique Resources within Operator Networks
Standardized APIs are necessary to help realize the tremendous growth potential for the Applications Market
OMA APIs expose the network assets that developers need - no matter what protocols,
platforms or other APIs they use
Core network assets must be made available in order to deploy the wide variety of new
applications and services that enter the market every day
The OMA set of APIs increases the portability of applications and services in order to reach the subscriber base of operators and service providers that deploy OMA APIs
As the number of APIs that perform the same functionality proliferate, fragmentation
occurs. This limits developer access to subscribers, and operator and service providers'
choices of development platforms and communities. The OMA API Program, through
standardization, solves this problem.
OMA Strategy on Open API StandardizationMusa Unmehopa
"OMA Strategy on Open API Standardization", presentation at the Next Generation Mobile Technology & Standardization Conference (KWISA), 17 November 2010, Seoul (Republic of Korea)
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
ETSI M2M Workshop - OMA Strategy for Internet of Things
1. Management and Provisioning of M2M Devices for a Connected World
ETSI M2M Workshop
26 October 2011
Musa Unmehopa
Technical Plenary Chairman, OMA
Senior Manager, Alcatel-Lucent
ETSI M2M 2011, Musa Unmehopa www.openmobilealliance.org
2. What I’ll be Talking About
ETSI M2M 2011, Musa Unmehopa 2 www.openmobilealliance.org
3. EXECUTIVE SUMMARY
IN THE M2M DOMAIN, OMA HAS TWO STRENGTHS
1. PROVISIONING AND MANAGEMENT OF M2M DEVICES
2. NETWORK AND DEVICE APIs FOR M2M APPLICATIONS
ETSI M2M 2011, Musa Unmehopa www.openmobilealliance.org
4. 1. PROVISIONING AND MANAGEMENT
ETSI M2M 2011, Musa Unmehopa www.openmobilealliance.org
5. Devices, devices everywhere…
According to industry analyst firm Ovum,
deployments of OMA enabled devices will reach
ONE BILLION globally by the end of 2011 !
ETSI M2M 2011, Musa Unmehopa 5 www.openmobilealliance.org
6. M2M devices outnumber mobile devices by an
order of magnitude
• Analysys Mason: Forecasts that the number of M2M device connections
will grow to 2.1 billion devices in 2020 [1]
• Machina Research: The installed base of M2M connected Consumer
Electronics devices will exceed 4.2 billion by 2020 [2]
• GSMA: Estimates that there will be 20 billion devices connected to the
web by 2020 [3]
ETSI M2M 2011, Musa Unmehopa 6 www.openmobilealliance.org
7. M2M devices outnumber mobile devices by an
order of magnitude
• Analysys Mason: Forecasts that the number of M2M device connections
will grow to 2.1 billion devices in 2020 [1]
• Machina Research: The installed base of M2M connected Consumer
Electronics devices will exceed 4.2 billion by 2020 [2]
• GSMA: Estimates that there will be 20 billion devices connected to the
web by 2020 [3]
• Another way of looking at this:
There will be more M2M devices shipped each year than PCs,
cell phones, tablets, set-top boxes, and gaming platforms put together [4]
ETSI M2M 2011, Musa Unmehopa 6 www.openmobilealliance.org
8. M2M devices outnumber mobile devices by an
order of magnitude
• Analysys Mason: Forecasts that the number of M2M device connections
will grow to 2.1 billion devices in 2020 [1]
• Machina Research: The installed base of M2M connected Consumer
Electronics devices will exceed 4.2 billion by 2020 [2]
• GSMA: Estimates that there will be 20 billion devices connected to the
web by 2020 [3]
• Another way of looking at this:
There will be more M2M devices shipped each year than PCs,
cell phones, tablets, set-top boxes, and gaming platforms put together [4]
The industry needs to agree on a protocol to talk to these devices
before it really can address the next level of issues.
All these devices must be provisioned and managed
ETSI M2M 2011, Musa Unmehopa 6 www.openmobilealliance.org
9. OMA position and focus
OMA recognizes the need for current OMA Device Management technology
to evolve as follows
• Technology needs to evolve from traditional mobile devices networks to
heterogeneous networks that support both mobile and M2M devices
• Technology needs to support devices on heterogeneous networks through a
Gateway
• Technology needs to support M2M devices as a gateway for other devices
• Technology needs to support provisioning and management protocol for
constrained devices
• Technology needs to support provisioning and management protocol for
constrained connectivity
• Provisioning and Management of M2M devices
• Connecting the Internet to the Physical World
ETSI M2M 2011, Musa Unmehopa 7 www.openmobilealliance.org
10. OMA position and focus
OMA recognizes the need for current OMA Device Management technology
to evolve as follows
• Technology needs to evolve from traditional mobile devices networks to
heterogeneous networks that support both mobile and M2M devices
• Technology needs to support devices on heterogeneous networks through a
Gateway
• Technology needs to support M2M devices as a gateway for other devices
• Technology needs to support provisioning and management protocol for
constrained devices
• Technology needs to support provisioning and management protocol for
constrained connectivity
• Provisioning and Management of M2M devices
• Connecting the Internet to the Physical World
A natural extension of OMA DM through Gateway
over lightweight M2M protocol can address these challenges
ETSI M2M 2011, Musa Unmehopa 7 www.openmobilealliance.org
11. OMA DM Gateway Management Object
• Facilitates interaction between a management server and a
management client when:
– Direct and unaided interaction between server and client is not possible
– Device does not have a publicly routable address
– Device may be sitting behind a firewall
– Device supports a management protocol other than OMA-DM
Approval scheduled for end of 2011
ETSI M2M 2011, Musa Unmehopa 8 www.openmobilealliance.org
12. OMA Converged Personal Network Service (CPNS)
• OMA CPNS enables interaction with in-home M2M services and
applications, using CPNS connections between personal
networks and the CPNS Server. This allows for remote control,
monitoring and content delivery
GwMO: Manage M2M Devices through a gateway
GwMO
CPNS: Use device as a gateway to manage other devices
CPNS
Approved in May 2011
ETSI M2M 2011, Musa Unmehopa 9 www.openmobilealliance.org
13. Lightweight M2M Protocol
• The need for a lightweight protocol for M2M
– support capability constrained M2M devices
– data collection and remote controlling without complex computing and UI
operations
– optimize network resources; very large numbers of devices may be connected
to the communication network simultaneously
• Requirements
– Compact protocol for combined service manipulation & management
– Binary based addressing scheme instead of URI
– Flat data model for efficient data access
– Simple protocol level authentication
– Simple Digest based authentication & authorization
– Support transport level security mechanism
– IP (TCP, UDP) & Non-IP Transport (SMS, USSD, CSD)
• Work just started, scheduled for completion end of next year
– First step is Gap Analysis; ETSI, 3GPP, IETF CoAP, OMA DM
– Specific details being developed at this stage
ETSI M2M 2011, Musa Unmehopa 10 www.openmobilealliance.org
14. 2. APIs FOR M2M APPLICATIONS
ETSI M2M 2011, Musa Unmehopa www.openmobilealliance.org
15. OMA API Program (Application Programming Interfaces)
• OMA APIs Standardize Access to Unique Resources within Operator
Networks
• Standardized APIs are necessary to help realize the tremendous growth
potential for the Applications Market
• OMA APIs expose the network assets that developers need - no matter
what signaling protocols, platforms or other APIs they use
• Core network assets and device capabilities must be made available in
order to deploy the wide variety of new applications and services that
enter the market every day
• Includes both Device APIs as well as Network APIs
http://www.openmobilealliance.org/API/
ETSI M2M 2011, Musa Unmehopa 12 www.openmobilealliance.org
16. Device API - DM Client side API Framework
• Defines APIs to enable local applications on a device to access the
Management Objects supported by the OMA DM Client resident on the
device:
– Local application registration/unregistration with the DM Client, for notification on
updates of existing Management Objects
– Retrieval of Management Object and its parameters by the local application
– Management Object update by the local application
– Local application interaction with the DM Client Management Objects
• DM Management Objects and the DM protocol:
– Configure connectivity
– Update firmware
– Diagnose problems
– Monitor performance
– Install and update software
– Lock and wipe personal data
– Manage device capabilities
– Schedule and automate device management tasks
• Interfaces defined using WebIDL
• Approved as Candidate by the OMA Board of Directors earlier this month
ETSI M2M 2011, Musa Unmehopa 13 www.openmobilealliance.org
17. Device API - Open Connection Manager API
• Local applications on the device can use the Open Connection
Manager API to manage connectivity and connections
– Cellular network connection management
– Wi-Fi connection management
– Network selection
– Power management (hibernation, standby)
– etc
• Requirements are completed and approved as Candidate by
the OMA Board of Directors in July 2011
• Scheduled for completion in the Spring of 2012
ETSI M2M 2011, Musa Unmehopa 14 www.openmobilealliance.org
18. Network APIs, a big list and growing
SOAP/WSDL APIs
Abstract APIs
• Account Management
• Call Control • Audio Call
• Call Notification • Application Driven QoS
• Call Handling • Call Notification
• Context Entity Discovery • Call Handling
• Context Information • Content Management
RESTful APIs
• Generic Data Change Notification • Device Capabilities
• Generic Data Management • Address List Management • Geocoding
• Identity Management • Audio Call • Multimedia Conference
• Identity Resolution • Call Control • Multimedia Messaging
• Multimedia Conference • Call Notification • Multimedia Multicast Session mgt
• Multimedia List Handling • Device Capabilities • Multimedia Streaming Control
• Service Discovery • Multimedia Messaging
• Payment
• Service Registration • Payment
• Policy
• Presence
• Presence
• Service User Profile Management
• Short Messaging • Short Messaging
• Terminal Location • Terminal Location
• Terminal Status • Terminal Status
Predominantly applicable in cellular environment • Third Party Call • Third Party Call
Also applicable in IP environment
ETSI M2M 2011, Musa Unmehopa 15 www.openmobilealliance.org
19. Bringing Everything Together
Device API Network API
Device API
CPNS CPNS
GwMO DM Protocol
Device API Network API
Device API
Lightweight M2M
Device API
Core Network
Provisioning and Management
Remote Control and Access
Device API M2M Device
Access Network Mobile Device
DM Client
DM Server / CPNS Server
ETSI M2M 2011, Musa Unmehopa 15 www.openmobilealliance.org
20. CONCLUSION
IN THE M2M DOMAIN, OMA HAS TWO STRENGTHS
1. PROVISIONING AND MANAGEMENT OF M2M DEVICES
2. NETWORK AND DEVICE APIs FOR M2M APPLICATIONS
ETSI M2M 2011, Musa Unmehopa www.openmobilealliance.org
23. OMA – Overview
More than 150 members from across the mobile value chain
• Founded June 2002
• Operators, terminal and software vendors, content and entertainment providers
Interoperable service enablers across multiple domains
• Architecture, Security, Charging and Network APIs
• Person-to-Person Communications
• Device Capabilities
• Access to Content
• Services Access Interface
• Service Customization
Current and Ongoing Technical Deliverables – more detail in presentation
• 44 service enablers delivered in 2010 with 80 planned for 2011
• Ongoing refinement of interoperability testing program with Test on Demand in Q3 2011
• API Framework—building on success of GSMA OneAPI and Parlay affiliation
• M2M Communications—enabling terminals as gateways and converged personal networks
New and improved organizational structures and efficiencies
• Fast track process for omitting or combining steps and deliverables in OMA Process
• Min Max procedure for an alternative path to traditional testing of every OMA enabler
Collaboration with other bodies—including WAC, GSMA, W3C & ETSI
• Reduce duplication and fragmentation
• New strategic program of liaisons with appointed Board level champions to other bodies
• OMA maintains formal cooperation agreements or frameworks with nearly 50 industry bodies
ETSI M2M 2011, Musa Unmehopa 19 www.openmobilealliance.org
24. OMA – Organizational Structure
ETSI M2M 2011, Musa Unmehopa 20 www.openmobilealliance.org
25. Highlights of OMA Service Enablers
Over 50 Candidate and Approved Enablers Published in the Last 18 Months
Candidate Enabler Releases
• OMA Device Management Smart Card V1_0
• OMA Lock and Wipe Management Object V1_0
• OMA Converged Address Book V1_0
• OMA XML Document Management V2_1
• OMA Secure Content Identification Mechanism V1_0
• OMA SIP Push V1_0
• OMA Location in SIP/IP Core V1_0
• OMA Secure User Plane Location V2_0
• OMA Mobile Search Framework V1_0
• OMA Mobile Codes V1_0
• OMA Mobile Advertising V1_0
• OMA Mobile Spam Reporting V1_0
• OMA Customized Multimedia Ringing 1.0
• OMA Presence Access Layer V 1.0
• OMA Mobile Spam Reporting V1.0
• OMA Application Layer Security Common Functions V1.1
• OMA Next Generation Service Interfaces V1.0
• OMA Digital Rights Management V2.2
• OAM Key Performance Indicators in OMA V1.0
• OMA Smart Card Web Server V1_2
• OMA Mobile SMIL V 1.0 (Reference Release)
A Candidate Enabler Release (CER) delivers an approved set of open technical specifications that can be
implemented in products and solutions, and then tested for interoperability.
An Approved Enabler Release (AER) represents Candidate Enabler Releases that have gone through the
Interoperability Program (IOP) of OMA. The IOP tests interoperability between different member company’s
implementations—either within the OMA or through other means.
ETSI M2M 2011, Musa Unmehopa 21 www.openmobilealliance.org
26. Highlights of OMA Service Enablers
Approved Enabler Releases
• OMA EFI V1.1
• OMA Browser Protocol Stack V1.2
• OMA Push V2.1
• OMA User Agent Profile V1.1
• OMA Rich-media Environment V 1.0
• OMA Games Services Client/Server Interface V1.0
• OMA DownLoad Over The Air V2.0
• OMA Browsing V2.4 (enhancements ph 2)
• OMA Look and Feel Customization
• OMA On Board key Generation / Wireless Public Key Infrastructure V1.0
• OMA Device Management V1_2
• OMA Smart Card Web Server V1_1
• OMA Presence SIMPLE V1_1
• OMA Global Service Architecture V1_0 (Reference Release)
• OMA IMPS Implementation Guidelines V1_3 (Reference Release)
A Candidate Enabler Release (CER) delivers an approved set of open technical specifications that can be
implemented in products and solutions, and then tested for interoperability.
An Approved Enabler Release (AER) represents Candidate Enabler Releases that have gone through the
Interoperability Program (IOP) of OMA. The IOP tests interoperability between different member company’s
implementations—either within the OMA or through other means.
ETSI M2M 2011, Musa Unmehopa 22 www.openmobilealliance.org
27. More Information
• OMA Communications Contact
Bobby Fraher, External Communications Manager
bobby@agilis-communications.com
• 2011 Q2 OMA Quarterly Newsletter
http://www.openmobilealliance.org/comms/pages/OMA_quarterly_2011_vol_2.htm
• Full list of OMA Mobile Service Enablers
http://www.openmobilealliance.org/Technical/releaseprogram.aspx
•OMA API Program
http://www.openmobilealliance.org/API
•Interested in joining the OMA
http://www.openmobilealliance.org/Membership/default.aspx
ETSI M2M 2011, Musa Unmehopa 23 www.openmobilealliance.org